Summary/Abstract |
This paper addresses the results of research on new approaches to developing methods of detecting vulnerabilities in military automated systems. We present a test bench for an information security audit system operating in a virtual environment that is as close to reality as possible.
|